You also can {createnewitem}."},menutooltip:"Display menu"},editview:{elementdependant:"This field depends on other field(s)",retentionperiod:{partial:"partial",finalized:"finalized",default:"Default",keepforsomedays:"{0} days",customization:"Custom (days):",keepforever:"Forever",validation:{errormessage:{long:"The {0} submission retention period field must be an integer between {1} and {2}",short:"Input must be an integer between {0} and {1}"}},revision:{warningmessage:"At least {0} submission(s) are affected by your retention policy change"}},notconfigured:"Not configured yet",insertplaceholder:"Insert placeholder",selectanitem:"Select an item",externalsystems:"External system field mapping",connecteddatasource:"Connect to Datasource",createemailtemplate:"Create email template",editemailtemplate:"Edit email template",addwebhook:"Add webhook",editwebhook:"Edit webhook",selectpage:"Select page",usemanualinput:"Use manual input",errorconditionalstepcannotcontainrequiredelement:"This Form step should not depend on other elements because it contains mandatory element [{0}].",cannotbuildformmodel:"Cannot build the form. You cannot use FormContainerBlock as a property. You can render a form in a ContentArea only.",resetconnecteddatasource:"Reset"},viewmode:{stepnavigation:{previous:"Previous step",next:"Next step",page:"Step"},untitled:"Untitled",selection:{selectanoption:"-- Select an option --",selectoptions:"-- Select options --"},reset:"Reset form",submit:"Submit",refreshcaptcha:"Refresh captcha",captchalabel:"Word verification",malformstepconfigruation:"Improperly formed FormStep configuration. Some steps are attached to pages, while some steps are not attached, or attached to content with no public URL.",commonvalidationfail:"This element value is not valid.",readonlymode:"Read-only mode. Submitted data is not saved.",submissionactors:{savedatatostorage:{error:"Something went wrong. Please contact the administrator for more information."}}},contentediting:{fielddependency:{condition:{field:"Field",operator:"Operator",value:"Value"},invalidcondition:"The condition is no longer valid",conditiondialog:{title:"Condition Details"}},optionitem:{caption:"Choice",value:"Value",checked:"Checked by default",containsinvalidcharacter:"Comma (,) character is not allowed."},emailtemplateactor:{fromemail:"From",fromemaildescription:"Email address to send from",toemails:"To",toemailsdescription:"Email address to send to, or name of a form field with the email address (for confirmation emails)",subject:"Subject",subjectdescription:"Subject line for the email. You can use #FIELDNAME# to insert values from the form.",body:"Message",bodydescription:"The body of the email. You can insert values from the form with #FIELDNAME#, or show a summary listing of the form fields with #SUMMARY.",fromemailplaceholder:"someone@example.com",toemailsplaceholder:"address@example.com,...",subjectplaceholder:"Enter email subject"},webhookactor:{url:"Webhook URL",urldescription:"Webhook URL to send data payload to (http or https protocol).",jsonformat:"POST data in JSON format"},validation:{circulardependency:"Circular dependency configuration is not allowed",greaterthanequaltoerrorformat:"The {0} must be >= {1}'s value.",lessthanequaltoerrorformat:"The {0} must be <= {1}'s value.",inrangeerrorformat:'"{0}" is not a valid value for {1}. Only number is allowed and {1} must be in range of [{2} - {3}]\'s value.',stepinrangeerrorformat:"The {0} must be >= 1 and <= {2} - {1} value.",positiveinteger:"Only a positive number is allowed."}}}}})})()
Cyber security
Strengthening cyber-security governance
At a time when digital threats are escalating and regulations are tightening, boards and C-level executives face unprecedented accountability for their organisation's cyber security. New EU regulations such as NIS2 mandate not just technical defences, but comprehensive governance frameworks that safeguard both the organisation and its leadership.
Good cyber security isn’t only about protection; it’s about business resilience and trust.
Oscar BirnbreierPartner, expert in cyber security
How we support our clients
Compliance checks and risk assessments
We pinpoint your organisation's assets, risks and compliance gaps. Our comprehensive assessments consider both financial and operational impacts to help you to prioritise mitigation efforts effectively.
Governance and control frameworks
We develop policies and frameworks that embed cyber security into your organisation’s core, ensuring robust protection and fostering a culture of security awareness at all levels. Our tailored processes support implementation and promote adoption across the business.
Reporting and data management
We help you to harness the power of your data. Our experts extract, analyse and report on your cyber-security data to uncover actionable insights. We also automate reporting and build custom dasards to provide clear, long-term visibility into your security posture.
Security maturity improvement and project management
We integrate seamlessly with your operational team to provide interim cyber-security expertise, accelerating your security journey. Our team will play a catalyst role in achieving your business’s cyber-security objectives.
Cyber-security due diligence
We help you to identify and assess the cyber-security risks and vulnerabilities that could affect your target’s value and operations, protecting you from potential legal and financial penalties. Our due diligence process uncovers non-compliance with the latest regulations and standards, giving you an edge in negotiations.
Watch our on demand cyber-security webinar to learn how you can leverage data to promote security governance within your organisation
We use cookies to improve the functionality and performance of this site. Please click 'Accept' to continue browsing the site. Learn about our use of cookies in our Privacy Policy.
We value your privacy
Please provide your consent for cookie usage on analysysmason.com. We use the following cookie types.
Essential cookies enable you to move around the website and use its features, such as accessing secure areas.
Third-party cookies enable us to monitor site usage. They will NOT be used to gather information that could be used for marketing to the user; or to remember user preferences or IDs outside a single session.
Session cookies are stored only temporarily during a browsing session and are deleted from the user's device when the browser is closed.
Persistent cookies create a convenient and faster website experience by remembering information, settings, preferences, or sign-on credentials.